1 Demystifying Mobile Security Aliza Kasim Research Analyst ICT Practice, Frost & Sullivan
May 19, 2015
1
Demystifying Mobile Security
Aliza Kasim
Research Analyst
ICT Practice, Frost & Sullivan
2
Table of Content
The Rise of Mobility
Transformation of the Enterprise
The Need for Mobile Security
Mobile Security Future Outlook
3
Transformation of the Enterprise
The Need for Mobile Security
Mobile Security Future Outlook
The Rise of Mobility
4
Computing and Mobility Coming Together
1970s1960s 1980s 1990s 2000
MainframeSupercomputer
2010
Smart Phones &
Tablets
Personal Computer
Laptop/Notebook
Mobile Phone (2G)
5
Source: Frost & Sullivan.
Merely for basic use like talk-time and texting
Integration of camera with the mobile phone. Users starting to use share images, videos, audio and rich text
Mobile phone has evolve into video phones and have video clip functionality and companies starting to setup websites like Youtube, Bebo and MySpace
Mobile phone became the mobile internet whereby it starting to use the Wireless Access Protocol (WAP). Starting to turn into basic computer and turned into a mini super computer soon after
Mobile devices evolved into the tablet which have higher capability. Works like the notebook or laptop with higher mobility and smaller in size
The Rise of Mobile Devices
6
Mobile Device Capabilities
Basic Services Complex
Services
Consumer Applications
Enterprise Applications
Web & Social Media
Cloud
7
Transformation of the Enterprise
The Rise of Mobility
The Need for Mobile Security
Mobile Security Future Outlook
Transformation of the Enterprise
8
The Role of the Individual
Facebook user, forum contributor
Human Individual
Public Domain
Personal Domain
Professional Domain
Employee, mobile worker, remote user
Home user, website blogger
9
The Era of Mobile Enterprise
Fixed, slow and limited connectivity
Devices are provided and given by the cooperation
Devices are fixed and not movable
Enteprise has full control
Security within the corporate network
Always connected...everywhere
Devices chosen by the users
Devices are mobile
Highly empowered users
Securing a dynamic network
Moving from: To:
10
MOBILE ENTERPRISE
Mobility Factor
BUSINESS USER
• Competitiveness• Productivity
• Customer reach• Speed of delivery
• Globalization
• Consumerization• Travel more • More savvy
• More option on mobile devices • More convenient
TECHNOLOGY
• High speed connection
• Cheaper bandwidth • Applications
11
Challenges for the Enterprise
• How does the enterprise have control over these devices?
Explosion of Mobile Device
12
The Need for Mobile Security
The Rise of Mobility
Transformation of the Enterprise
Mobile Security Future Outlook
The Need for Mobile Security
13
Major Security Risks
MobileSecurity Risks
WEB-BASED ATTACKS
UNSECURED NETWORK
BACKDOOR TO ENTEPRISE NETWORK
DEVICE BREACHESDATA LOSS AND
INTEGRITY
NETWORK AND SYSTEM ABUSE
MALICIOUS SOFTWARE
LOST OR STOLEN MOBILE DEVICES
14
Adoption Trends in Mobile Security
Lack of Clear Market Definition
Market Restraints
Device-centric vs User-centric
Exploratory Mindset towards Mobile Security
Adoption Trends
Uncertain Attitudes towards Mobility
Factor
Traditional Outlook towards Information
Security
Extension of Existing Security Strategy
15
What is Mobile Security?
MALWARE PROTECTION
DEVICE MANAGEMENT
ACCESS MANAGEMENT
DATA PROTECTION
APPLICATION MONITORING
& CONTROL
16
What Should be Secured?
Device
Lock
Wipe
Locate
Data
Encryption
File Protection
Data leakages
Authentication
Management policies
Application
Rogue Applications
Visibility on Applications
Controls over Applications
User
Profiling
Location of the User
Mobile Security
17
What Enterprise Should Do…
POLICIES & FRAMEWORK
AUTHENTICATE USERS & DEVICES
ENCRYPTION
MONITORING &
MANAGEMENT
SECURE CONNECTION
EDUCATING & AWARENESS
Securing Enterprise
18
Mobile Security Future Outlook
The Rise of Mobility
Transformation of the Enterprise
The Need for Mobile Security
Mobile Security Future Outlook
19
Mobile Security Market: Revenue Forecasts (APAC), 2010-2013
2010 2011 2012 20130
10
20
30
40
50
60
0
0.2
0.4
0.6
0.8
17.621.9
30.2
51.324.4%
37.9%
69.9%
Revenue YoY Growth
Reve
nue
(Mill
ion)
YoY
Gro
wth
Source: Frost & Sullivan
CAGR: 42.8%
Revenue Forecast
20
Market Opportunities in Mobile Security
India
Japan
China
South Korea
Low Opportunity High OpportunityFuture Revenue Opportunity
Low
Hig
hC
AG
R
Australia
New Zealand
Hong Kong
Singapore
MalaysiaTaiwan
Philippines
Indonesia
Thailand
Vietnam
Source: Frost & Sullivan
Advanced in terms of technology with 3G and 4G connection
High level of awareness and
government support
Still lagging behind but adoption rate is getting
higher
Price for mobile broadband is still
markedly expensive
Vast adoption of mobile devices
21
Mobile Security Players
VSMOBILE DEVICE MANAGEMENT PLAYER
INFORMATION SECURITY PLAYER
• Device-centric• Focus on the device
• Management of the device
• Network-centric• Treating mobile devices as part of the network
• Mobile security is treated as an extension to end-point security
22
Future of Mobile Security
Devices
Users Experience
Mobile Applications
Centralized Platforms
Managed Devices
23
http://twitter.com/frost_sullivan
Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter
http://www.facebook.com/pages/Frost-Sullivan/249995031751?ref=ts
http://www.linkedin.com/companies/4506
http://www.slideshare.net/FrostandSullivan
24
For Additional Information
Donna JeremiahCorporate CommunicationsAsia Pacific+603 6204 [email protected]
Carrie LowCorporate CommunicationsAsia Pacific+603 6204 [email protected]
Aliza KasimResearch AnalystICT+603 6205 [email protected]